Analyzing security protocols in hierarchical networks

  • Authors:
  • Ye Zhang;Hanne Riis Nielson

  • Affiliations:
  • Informatics and Mathematical Modelling, Technical University of Denmark, Kongens Lyngby, Denmark;Informatics and Mathematical Modelling, Technical University of Denmark, Kongens Lyngby, Denmark

  • Venue:
  • ATVA'06 Proceedings of the 4th international conference on Automated Technology for Verification and Analysis
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series of experiments we have conducted.